Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/17171
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSengupta, Anirbanen_US
dc.contributor.authorChourasia, Vishalen_US
dc.contributor.authorBhui, Nabenduen_US
dc.date.accessioned2025-11-12T16:56:47Z-
dc.date.available2025-11-12T16:56:47Z-
dc.date.issued2025-
dc.identifier.citationSengupta, A., Chourasia, V., & Bhui, N. (2025). HLS Trojan Classification and Its Detection Techniques for CAD-Based IP Designs. IT Professional, 27(5), 66–74. https://doi.org/10.1109/MITP.2025.3584043en_US
dc.identifier.issn1520-9202-
dc.identifier.otherEID(2-s2.0-105020374531)-
dc.identifier.urihttps://dx.doi.org/10.1109/MITP.2025.3584043-
dc.identifier.urihttps://dspace.iiti.ac.in:8080/jspui/handle/123456789/17171-
dc.description.abstractThis article presents a comprehensive coverage on Trojan classification and its detection techniques for CAD high-level synthesis (HLS) based intellectual property (IP) designs. The presented article highlights the state-of-the-art IP (hardware) Trojan types, their covert insertion sites in the design process, their payloads, as well as the detective countermeasure employed in the literature. The article also succinctly describes the threat model tackled in each HLS-IP Trojan detection technique along with its approach/functionality. The article finally provides a qualitative and quantitative analysis of each Trojan detection technique along with its comparison. © 2025 Elsevier B.V., All rights reserved.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.sourceIT Professionalen_US
dc.titleHLS Trojan Classification and Its Detection Techniques for CAD-Based IP Designsen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: